Sat.Apr 18, 2020 - Fri.Apr 24, 2020

What Is Agile Enterprise Architecture? Just Enough, Just in Time

erwin

Having an agile enterprise architecture (EA) is the difference between whether an organization flourishes or flounders in an increasingly changing business climate. Over the years, EA has gotten a bad reputation for not providing business value.

Hackers Target Oil Companies as Prices Plunge

WIRED Threat Level

The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices. . Security Security / Cyberattacks and Hacks

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Nintendo Confirms Breach of 160,000 Accounts

Threatpost

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked. Breach Web Security data breach Fortnite Nintendo Nintendo account hack nintendo breach NNID wii U

Remote Workforce: Securing the Next Normal

Data Breach Today

SailPoint's Mike Kiser on Rising Need for Zero Trust, Cloud Governance The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017.

More Trending

Automated Bots Are Increasingly Scraping Data & Attempting Logins

Dark Reading

The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity

109
109

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Security Affairs

Security researchers from Volexity discovered a new Insomnia iOS exploit that was being used to spy on China’s Uyghur minority. The Uyghur group is a Turkic minority ethnic group originating from and culturally affiliated with the general region of Central and East Asia.

IT Services Firm Cognizant Hit with Maze Ransomware

Dark Reading

Cognizant is working with cyber defense firms and law enforcement to investigate the attack, disclosed April 17

Secure Together: Netflix scams and how to report suspicious emails

IT Governance

With the UK government recently confirming that the lockdown will be extended for a further three weeks, we hope you’re comfortable in your remote work set-up – or, at least, as comfortable as one can hope.

Paper 78

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Attackers Increasingly Using Web Shells to Create Backdoors

Data Breach Today

NSA, Australian Signals Directorate, Offer Mitigation Tips The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors

Hacking Apple iPhones and iPads by sending emails to the victims

Security Affairs

Two zero-day flaws in the default mailing app pre-installed on iPhones and iPads allow attackers to hack the devices just by sending emails.

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

Threatpost

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

COVID-19 Caption Contest Winners

Dark Reading

It was a tough choice! And the winner is

IT 88

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Expert discloses 4 zero-days in IBM Data Risk Manager

Security Affairs

A security researcher disclosed details of four zero-day flaws impacting an IBM security product after the IT giant refused to address them.

Risk 94

Genetic Testing Lab Hack Affects 233,000

Data Breach Today

Second Largest Health Data Breach So Far This Year A California-based genetic testing laboratory has reported an email hacking incident that may have exposed medical information on nearly 233,000 individuals.

When in Doubt: Hang Up, Look Up, & Call Back

Krebs on Security

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening.

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

The Last Watchdog

Privileged Access Management ( PAM ) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network. Related: Active Directory holds ‘keys to the kingdom’ The basic idea was to make sure only the folks assigned “privileged access’’ status could successfully log on to sensitive servers. PAM governs a hierarchy of privileged accounts all tied together in a Windows Active Directory ( AD ) environment.

Access 121

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

WHO Confirms Email Credentials Leak

Dark Reading

Washington Post had identified the group as one among several whose passwords and emails were dumped online and abused

Cognizant: Ransomware Attack Disrupting Services

Data Breach Today

SEC Filing Shows Company Still Assessing Maze Attack IT services and consulting giant Cognizant is still assessing the damage from a ransomware attack on Friday. And it's warning that the incident is disrupting services to some of its clients and could affect the company's revenue

267 Million Facebook identities available for 500 euros on the dark web

Security Affairs

Over 267 million Facebook profiles are offered for sale on dark web sites and hacker forums, the dump is offered for £500 ($623) and doesn’t include passwords.

Sales 114

Global Surveillance in the Wake of COVID-19

Schneier on Security

OneZero is tracking thirty countries around the world who are implementing surveillance programs in the wake of COVID-19: The most common form of surveillance implemented to battle the pandemic is the use of smartphone location data, which can track population-level movement down to enforcing individual quarantines.

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

White-Hat Hackers Help 'Fold' COVID-19 Proteins

Dark Reading

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease

114
114

Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments

Data Breach Today

Hacker Disrupted Delivery of Supplies Used in COVID-19 Crisis, DOJ Says The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.

259
259

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic.

New iPhone Zero-Day Discovered

Schneier on Security

Last year, ZecOps discovered two iPhone zero-day exploits.

IT 106

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Apple iOS Zero-Day Vulnerabilities Exploited in Targeted Attacks

Dark Reading

One of the flaws is remotely exploitable with no user interaction needed, ZecOps says

112
112

Cybercriminals Using Zoom, WebEx as Phishing Lures: Report

Data Breach Today

Campaigns Aimed at Stealing Credentials, Distributing Malware Cybercriminals are using spoofed messages and images from Zoom and Cisco WebEx as lures in new phishing campaigns that are designed to steal credentials or distribute malware, according to the security firm Proofpoint

Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns

Security Affairs

The FBI announced that the number of cybercrime reports is spiked since the beginning of the Coronavirus (COVID-19) pandemic.